With the proliferation of malware on IoT devices, research on IoT malicious code has also become more mature. Most studies use learning models to detect or classify malware. Therefore, ensuring high-quality labels for malware samples is crucial to maintaining research accuracy. Researchers typically submit malware samples to Anti-Virus (AV) engines to obtain labels, but different engines have varying rules for detecting maliciousness and variants. This study aims to improve future IoT malware research accuracy by investigating label quality. We address three label-related issues, including Anti-Virus detection technology, naming rules, and label expiration. Additionally, we examine multiple sources of malware labels, including 63 studies on...
Malware has been one of the key concerns for Information Technology security researchers for decades...
Introduction: Internet of Things (IoT) devices have revolutionized homes, offices, and cities, where...
The use of malware samples is usually required to test cyber security solutions. For that, the corre...
Malware may disrupt the internet of thing (IoT) system/network when it resides in the network, or ev...
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classi...
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classi...
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack ce...
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecuri...
With the increasing proliferation of IoT systems, the security of IoT systems has become very import...
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of large-scale Io...
Abstract: Internet of Things (IoT) revolution has challenged IoT security architects to great exten...
The rapid increase in the number of malicious programs has made malware forensics a daunting task an...
Malware plays a major role as a threat to the security of computer systems. As the Internet of thing...
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails oppo...
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails oppo...
Malware has been one of the key concerns for Information Technology security researchers for decades...
Introduction: Internet of Things (IoT) devices have revolutionized homes, offices, and cities, where...
The use of malware samples is usually required to test cyber security solutions. For that, the corre...
Malware may disrupt the internet of thing (IoT) system/network when it resides in the network, or ev...
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classi...
The increasing number of Android malware forced antivirus (AV) companies to rely on automated classi...
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack ce...
In recent years, the increase in non-Windows malware threats had turned the focus of the cybersecuri...
With the increasing proliferation of IoT systems, the security of IoT systems has become very import...
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of large-scale Io...
Abstract: Internet of Things (IoT) revolution has challenged IoT security architects to great exten...
The rapid increase in the number of malicious programs has made malware forensics a daunting task an...
Malware plays a major role as a threat to the security of computer systems. As the Internet of thing...
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails oppo...
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails oppo...
Malware has been one of the key concerns for Information Technology security researchers for decades...
Introduction: Internet of Things (IoT) devices have revolutionized homes, offices, and cities, where...
The use of malware samples is usually required to test cyber security solutions. For that, the corre...